CYBER SECURITY (AUC-002)

Download notes of CYBER SECURITY (AUC-002)

Click here

Upload your notes

I recommend you to study from book Introduction to Information Security & Cyber Laws as the language is very easy and topics are well explained.

You can refer important topics from here

Syllabus of CYBER SECURITY (AUC-002)

UNIT-1
Introduction  to  information  systems,  Types  of  information  Systems,  Development  of  Information Systems, Introduction to information security, Need for Information security, Threats to Information Systems, Information Assurance, Cyber Security, and Security Risk Analysis.

UNIT-2
Application security (Database, E-mail and Internet), Data Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Intrusion Detection, Access Control.
Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious Software, Network and Denial of Services Attack, Security Threats to E-Commerce- Electronic Payment System, e-Cash, Credit/Debit Cards. Digital Signature, public Key Cryptography.

UNIT-3
Developing  Secure  Information  Systems,  Application  Development  Security,  Information  Security Governance & Risk Management, Security Architecture & Design Security Issues in Hardware, Data Storage   & Downloadable Devices, Physical Security of IT Assets, Access Control, CCTV and intrusion Detection Systems, Backup Security Measures.

UNIT-4
Security Policies, Why Policies should be developed, WWW policies, Email Security policies, Policy Review Process-Corporate policies-Sample Security Policies, Publishing and Notification Requirement of the Policies.
Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License, Semiconductor Law and Patent Law.

References :

1. Charles P. Pfleeger, Shari Lawerance Pfleeger, “Analysing Computer Security ”, Pearson Education India.
2. V.K. Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi India.
3.Dr. Surya Prakash Tripathi, Ritendra Goyal, Praveen kumar Shukla ,”Introduction to Information Security and Cyber Law” Willey Dreamtech Press.
4. Schou, Shoemaker, “ Information Assurance for the Enterprise”, Tata McGraw Hill.
5. CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited ,Delhi ,India

Share
Published by
uptusuccess

Recent Posts

What I’ve Learnt This Year, Including Getting My Finances Organised

When I was a child, I remember watching a movie in which a wild bird was shot. It was flying…

3 months ago

How Engineering Colleges are Gearing up for Kochi Smart City

In the last 15 years, there has been a shift in the education sector of Kerala. The recent Kerala Plus…

4 months ago

UMC Engineering Corporation – Innovative Solutions

UMC Engineering Corporation, the oilfield service company in Houston is known to use the Permian Basin of West Texas to…

4 months ago

Types of Engineering Careers

If you guys are confused on what to take as career, we are here to help you with the vast…

5 months ago

Why Engineers Need Soft Skills to Stand Out and Succeed

Getting a job nowadays is not possible by simply preparing stuff from the books and improving your technical skills. There…

5 months ago

ARTIFICIAL INTELLIGENCE (NCS-702)

Download notes of ARTIFICIAL INTELLIGENCE (NCS-702) Click Here to Download Upload your notes Syllabus of ARTIFICIAL INTELLIGENCE (NCS-702) Unit-I 10Introduction…

9 months ago

To join Facebook Group Click Here
To join Whatsapp GroupClick Here
To join G Plus Community Click Here